01.01.2015 Views

Proceedings [PDF] - Measurement and Analysis of P2P Activity ...

Proceedings [PDF] - Measurement and Analysis of P2P Activity ...

Proceedings [PDF] - Measurement and Analysis of P2P Activity ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

International Conference Advances in the <strong>Analysis</strong> <strong>of</strong> Online Paedophile <strong>Activity</strong> Paris, France; 2-3 June, 2009<br />

– Eclipsing content: we eclipse entries <strong>of</strong> the DHT to remove the targeted<br />

contents from the network <strong>and</strong> prevent users from accessing it.<br />

– Index poisoning: we poison the DHT references with very attractive fake<br />

files showing a high number <strong>of</strong> sources.<br />

– Promoting Honeypots: we attract the final download requests for the<br />

controlled files towards our Honeypots.<br />

By attracting all the publications <strong>and</strong> searchs <strong>of</strong> paedophile contents (keywords<br />

<strong>and</strong> files), our architecture can assess <strong>and</strong> control the paedophile behavior<br />

from the initial search <strong>of</strong> keyword to the final download.<br />

3 Experiments<br />

To test our solution, we eclipsed the good references for the keyword ”spiderman”<br />

<strong>and</strong> poisoned them with 4 fake files for one day. The results in figure 1 <strong>and</strong> 2<br />

show that our architecture is effective <strong>and</strong> the importance to control the number<br />

<strong>of</strong> sources to build an efficient Honeypot. Our upcoming work consists to deploy<br />

our architecture to specifically study <strong>and</strong> fight against paedophile activities.<br />

Fig. 1. Results <strong>of</strong> a search for ”spiderman” under eclipse <strong>and</strong> poison (4 fake files)<br />

Fig. 2. Proportion <strong>of</strong> download requests received for each fake file<br />

Acknowledgment: This work is funded by the French ANR Research Project<br />

MAPE(<strong>Measurement</strong> <strong>and</strong> <strong>Analysis</strong> <strong>of</strong> Peer-to-peer Exchanges for pedocriminality<br />

fighting <strong>and</strong> traffic pr<strong>of</strong>iling), under contract ANR-07-TLCOM-24.<br />

90

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!